US12277587B2 - Method and apparatus for agreement of block in blockchain network - Google Patents
Method and apparatus for agreement of block in blockchain network Download PDFInfo
- Publication number
- US12277587B2 US12277587B2 US17/105,761 US202017105761A US12277587B2 US 12277587 B2 US12277587 B2 US 12277587B2 US 202017105761 A US202017105761 A US 202017105761A US 12277587 B2 US12277587 B2 US 12277587B2
- Authority
- US
- United States
- Prior art keywords
- nodes
- congress
- node
- block
- agreement
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active, expires
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/0601—Electronic shopping [e-shopping]
- G06Q30/0613—Electronic shopping [e-shopping] using intermediate agents
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/16—Error detection or correction of the data by redundancy in hardware
- G06F11/18—Error detection or correction of the data by redundancy in hardware using passive fault-masking of the redundant circuits
- G06F11/183—Error detection or correction of the data by redundancy in hardware using passive fault-masking of the redundant circuits by voting, the voting not being performed by the redundant components
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/0703—Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
- G06F11/0706—Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation the processing taking place on a specific hardware platform or in a specific software environment
- G06F11/0709—Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation the processing taking place on a specific hardware platform or in a specific software environment in a distributed system consisting of a plurality of standalone computer nodes, e.g. clusters, client-server systems
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/16—Error detection or correction of the data by redundancy in hardware
- G06F11/18—Error detection or correction of the data by redundancy in hardware using passive fault-masking of the redundant circuits
- G06F11/187—Voting techniques
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/104—Peer-to-peer [P2P] networks
- H04L67/1087—Peer-to-peer [P2P] networks using cross-functional networking aspects
- H04L67/1093—Some peer nodes performing special functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/40—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass for recovering from a failure of a protocol instance or entity, e.g. service redundancy protocols, protocol state redundancy or protocol service redirection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
- H04L9/3255—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using group based signatures, e.g. ring or threshold signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
- H04L9/3265—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate chains, trees or paths; Hierarchical trust model
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q2220/00—Business processing using cryptography
- G06Q2220/10—Usage protection of distributed data files
- G06Q2220/16—Copy protection or prevention
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/56—Financial cryptography, e.g. electronic payment or e-cash
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
Definitions
- This disclosure relates to a method and an apparatus for agreement of a block in a blockchain network.
- PBFT Practical Byzantine Fault Tolerance
- An exemplary embodiment provides an agreement method of a block in a blockchain network by a chair node.
- the candidate empty block may include information about a next block congress determined in a process in which the exceptional situation occurred.
- the method may further include organizing a new congress for an agreement of an empty block after receiving the information on the exceptional situation, wherein the new congress may be a congress of the agreement processes of the block or a congress including other nodes included in the blockchain network.
- the method may further include organizing a new congress for an agreement of an empty block based on nodes which participated in a creation of a genesis block of the blockchain network after receiving the information on the exceptional situation.
- a chair node device for performing a block agreement in a blockchain network.
- the chair node includes: a processor, a memory, and a communication unit, wherein the processor executes a program stored in the memory to perform: detecting an exceptional situation which occurred during distributed agreement processes for a block; transmitting an empty block agreement start message including information on the exceptional situation and verification data for the exceptional situation to the plurality of congress nodes through the communication unit; generating a candidate empty block which does not include a transaction when receiving a delegate request message from at least two congress nodes among the plurality of congress nodes and transmitting the candidate empty block to committee nodes through the communication unit; and generating a final empty block when the candidate empty block is verified by the committee nodes and transmitting the final empty block to all nodes in the blockchain network through the communication unit.
- the processor may perform detecting a first exceptional situation which occurred in a delegate request phase of the distributed agreement processes.
- the processor may perform determining that a number of delegate request messages transmitted to the chair node device is smaller than a number of predetermined committee nodes.
- the processor may perform determining that a number of commit messages transmitted to the chair node device is smaller than a number of predetermined committee nodes.
- the processor may perform: receiving a commit message including signatures of the committee nodes from the committee nodes after the candidate empty block is verified by the committee nodes; and performing a multi-signature procedure by collecting the signatures of the committee nodes, and generating the final empty block by using the multiple signature.
- FIG. 7 is a flowchart illustrating a method for determining an empty block congress according to an exemplary embodiment.
- FIG. 1 is a schematic diagram illustrating a distributed agreement method of a blockchain network according to an exemplary embodiment.
- a client may be a node that creates a transaction to be stored in a block which is a target of a block agreement.
- a congress for a distributed agreement of blocks may consist of a plurality of nodes in the blockchain network, and the number of congress nodes in the blockchain network may be 3f+1, where f is an integer greater than or equal to 0, and may be the number of nodes with malicious purposes.
- the chair node to send the delegate request fails or the delegate request is not normally delivered to the chair node due to network transmission delay (e.g., the case of the member node 3 in FIG. 1 ), the chair node cannot organize the committee (organizing failure of the committee) and then block agreement cannot proceed at this time.
- the handling method for the exceptional situation which may occur in the delegate request phase will be described in detail.
- the chair node may generate a candidate block based on transactions commonly submitted by at least f+1 different nodes among the transactions included in the received delegate request message.
- the chair node may generate data to verify that the transaction stored in the candidate block is a transaction submitted by at least f+1 different nodes.
- the chair node may generate information about 3f+1 nodes among nodes which have transmitted agreement participation request messages for the next block as the next block congress information, and store the next block congress information in the candidate block.
- the committee node which has received the preparation message within the predetermined time, may verify the candidate block, and when the verification of the candidate block is completed, may transmit a signature to the chair node through a commit message (commit phase).
- the chair node may collect the signatures transmitted from the committee nodes and perform the multi-signature procedure on the candidate blocks (e.g., one signature can be created by merging the signatures of each committee node), and the finally agreed Block may be generated. If the failure of the committee node or the delay in the network transmission occurs, the chair node cannot normally receive the commit message, and the chair node may fail to generate the final block. Referring to FIG. 5 , the handling method of the exceptional situation which may occur in the commit phase will be described in detail.
- Each node included in the blockchain network may calculate the coupon value using the nonce value to be used in the next block and the header hash value of the current block to verify qualification for the congress of the next block, and may compare the calculated coupon value with the current difficulty.
- the chair node of the congress of the current block may receive a participation message to participate in the agreement of the next block from each node in the blockchain network (S 110 ).
- the node may transmit the nonce value used for calculating the coupon value together with the participation message, so that the node which has transmitted the participation message to the chair node may verify the qualification (or eligibility) to participate in the congress for the next block.
- the chair node which has received the participation message for the agreement of the next block transmitted in the delegate request phase, may organize 3f+1 nodes as the next block congress in the order of the participation message received.
- the chair node may calculate the coupon value of each node using the nonce value of each node, and may elect the node with the smallest coupon value as the chair node of the next block congress.
- the chair node may store information on the next block congress in the final block agreed after the current block is agreed.
- the agreed block may be delivered to all blocks in the blockchain network in the reply phase along with the information on the next block congress.
- the information on the next block congress may include information on the chair node of the next block congress and the congress node of the next block congress. Therefore, the node receiving the agreed block may know the chair node and the congress node of the next block congress based on the information of the next block congress.
- a node that is a congress node but is not included in the committee may receive a committee exclusion message from the chair node indicating that it has been excluded from the committee.
- the committee node may perform the commit phase (S 330 ).
- the level of the committee participation of the node may be determined by the following method. For example, when an agreed block is normally connected to the blockchain, the level of the committee participation of the node participating as the committee node in the block agreement may be increased (e.g., 1 point increase). Alternatively, if the block agreement fails, the level of the committee participation of the nodes included in the committee may be decreased (e.g., decrease by 1 point).
- the EA chair node may generate the empty block containing information on the next block congress (S 650 ), and the next block congress may perform the empty block agreement with the agreement of the next block (S 660 ). Afterwards, when the EA chair node succeeds in agreement on the empty block (S 670 ), the next block agreement may be initiated (S 680 ).
- exceptional situations occurring in the preparation phase may be detected by the congress node, and the congress node may determine a new chair node and notify the new chair node of the occurrence of the exceptional situations.
- exceptional situations which occurred in the reply phase may be detected by the congress node or the committee node, and the congress node or the committee node may determine a new chair node and notify the new chair node of the occurrence of the exceptional situations.
- the congress node may verify the exceptional situations using data for verifying the occurrence of the exceptional situations, and then transmit the delegate request message to the chair node (delegate request phase) (S 730 ).
- the delegate request message may include verification completed data and data required for the multi-signature procedure.
- the committee node may verify the candidate empty block, and when the verification is completed, transmit the commit message including the signature of the committee node to the chair node (commit phase) (S 750 ).
- the chair node may perform multi-signature procedure by collecting the signatures included in the commit message, and generate a final empty block to which the agreement has been completed using the multiple signatures. The final empty block does not contain transactions. Then, the chair node may propagate the final empty block to all nodes in the blockchain network (reply phase) (S 760 ).
- the chair node may re-organize the committee by replacing a node that has not transmitted the commit message (e.g., member node 2 of FIG. 10 ) among the committee nodes with a node that has transmitted the delegate request message (stored at a delegate request process phase).
- the chair node may re-configure information required for the previously configured multi-signature procedure to proceed with the reorganized committee, and transmit the reconfigured information to all congress nodes (Re-agreement notify). Then, the chair node may proceed with the agreement of the block again by performing the prepare phase again.
- the node device may be implemented as a computer system, for example, a computer-readable medium.
- the computer system 1100 may include at least one of a processor 1110 , a memory 1130 , an input interface device 1150 , an output interface device 1160 , and a storage device 1140 communicating through a bus 1170 .
- the computer system 1100 may also include a communication device 1120 coupled to the network.
- the processor 1110 may be a central processing unit (CPU) or a semiconductor device that executes instructions stored in the memory 1130 or the storage device 1140 .
- the memory 1130 and the storage device 1140 may include various forms of volatile or nonvolatile storage media.
- the memory may include read only memory (ROM) or random access memory (RAM).
- ROM read only memory
- RAM random access memory
- the memory may be located inside or outside the processor, and the memory may be coupled to the processor through various means already known.
- the memory is a volatile or nonvolatile storage medium of various types, for example, the memory may include read-only memory (ROM) or random access memory (RAM).
- the communication device 1120 may transmit or receive a wired signal or a wireless signal.
- the program instructions to be recorded on the computer-readable medium may be those specially designed or constructed for the embodiments of the present disclosure or may be known and available to those of ordinary skill in the computer software arts.
- the computer-readable recording medium may include a hardware device configured to store and execute program instructions.
- the computer-readable recording medium can be any type of storage media such as magnetic media like hard disks, floppy disks, and magnetic tapes, optical media like CD-ROMs, DVDs, magneto-optical media like floptical disks, and ROM, RAM, flash memory, and the like.
- Various techniques described herein may be implemented as digital electronic circuitry, or as computer hardware, firmware, software, or combinations thereof.
- the techniques may be implemented as a computer program product, i.e., a computer program tangibly embodied in an information carrier, e.g., in a machine-readable storage device (for example, a computer-readable medium) or in a propagated signal for processing by, or to control an operation of a data processing apparatus, e.g., a programmable processor, a computer, or multiple computers.
- processors suitable for execution of a computer program include, by way of example, both general and special purpose microprocessors, and any one or more processors of any kind of digital computer.
- a processor will receive instructions and data from a read-only memory or a random access memory or both.
- Elements of a computer may include at least one processor to execute instructions and one or more memory devices to store instructions and data.
- a computer will also include or be coupled to receive data from, transfer data to, or perform both on one or more mass storage devices to store data, e.g., magnetic, magneto-optical disks, or optical disks.
- a processor and a memory may be supplemented by, or integrated into, a special purpose logic circuit.
- the processor may run an operating system 08 and one or more software applications that run on the OS.
- the processor device also may access, store, manipulate, process, and create data in response to execution of the software.
- the description of a processor device is used as singular; however, one skilled in the art will be appreciated that a processor device may include multiple processing elements and/or multiple types of processing elements.
- a processor device may include multiple processors or a processor and a controller.
- different processing configurations are possible, such as parallel processors.
- non-transitory computer-readable media may be any available media that may be accessed by a computer, and may include both computer storage media and transmission media.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Business, Economics & Management (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Quality & Reliability (AREA)
- Economics (AREA)
- Development Economics (AREA)
- Marketing (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
Claims (4)
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| KR10-2020-0093344 | 2020-07-27 | ||
| KR1020200093344A KR102577432B1 (en) | 2020-07-27 | 2020-07-27 | Method and apparatus for agreement of block in blockchain network |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| US20220027970A1 US20220027970A1 (en) | 2022-01-27 |
| US12277587B2 true US12277587B2 (en) | 2025-04-15 |
Family
ID=80267888
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US17/105,761 Active 2043-01-10 US12277587B2 (en) | 2020-07-27 | 2020-11-27 | Method and apparatus for agreement of block in blockchain network |
Country Status (2)
| Country | Link |
|---|---|
| US (1) | US12277587B2 (en) |
| KR (1) | KR102577432B1 (en) |
Families Citing this family (18)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN112911011B (en) * | 2021-02-05 | 2022-05-27 | 深圳前海益链网络科技有限公司 | Block generation control method applied to block chain and related device |
| CN113568972B (en) * | 2021-07-13 | 2025-03-07 | 华中科技大学 | A hybrid consensus implementation device and implementation method for graph-based blockchain |
| KR102568418B1 (en) * | 2021-08-26 | 2023-08-18 | 하이파이브랩 주식회사 | Electronic authentication system and method supporting multi-signature |
| CN114928650B (en) * | 2022-04-26 | 2023-06-30 | 成都质数斯达克科技有限公司 | Block chain data consensus method, device, equipment and readable storage medium |
| KR102818057B1 (en) * | 2022-09-27 | 2025-06-11 | 한국전자통신연구원 | Method and apparatus of adding additional chain to blockchain, and method and apparatus of generating shard for the same |
| US20240129108A1 (en) * | 2022-10-14 | 2024-04-18 | Tencent Technology (Shenzhen) Company Limited | Data processing methods and apparatuses based on blockchain, electronic device, computer-readable storage medium, and computer program product |
| WO2024122696A1 (en) * | 2022-12-09 | 2024-06-13 | 주식회사 리드포인트시스템 | Blockchain network system based on random non-contentious consensus, and operation method |
| WO2024122697A1 (en) * | 2022-12-09 | 2024-06-13 | 주식회사 리드포인트시스템 | Blockchain network system based on random contention-free consensus and operation method thereof |
| KR102822319B1 (en) * | 2022-12-14 | 2025-06-18 | 주식회사 리드포인트시스템 | Blockchain network system based on random non-competitive consensus and method of operating the same |
| KR102822318B1 (en) * | 2022-12-14 | 2025-06-18 | 주식회사 리드포인트시스템 | Blockchain network system based on random non-competitive consensus and method of operating the same |
| US11914616B1 (en) | 2022-12-16 | 2024-02-27 | Alchemy Insights, Inc. | Systems and methods for creating a consistent blockchain including block commitment determinations |
| US11728976B1 (en) | 2022-12-22 | 2023-08-15 | Alchemy Insights, Inc. | Systems and methods for efficiently serving blockchain requests using an optimized cache |
| US11816021B1 (en) | 2022-12-22 | 2023-11-14 | Alchemy Insights, Inc. | System and method for intelligent testing of blockchain applications using a shadow system |
| US11769143B1 (en) | 2022-12-22 | 2023-09-26 | Alchemy Insights, Inc. | System and method for high performance providing fresh NFT metadata |
| US11750711B1 (en) | 2022-12-22 | 2023-09-05 | Alchemy Insights, Inc. | Systems and methods for adaptively rate limiting client service requests at a blockchain service provider platform |
| US11811955B1 (en) * | 2022-12-23 | 2023-11-07 | Alchemy Insights, Inc. | Systems and methods for improving reliability in blockchain networks using sharding |
| CN116192868B (en) * | 2023-04-27 | 2023-09-08 | 南方科技大学 | Parallel Bayesian fault tolerance consensus method and terminal applied to alliance chain |
| WO2025219949A1 (en) * | 2024-04-18 | 2025-10-23 | 1Inch Limited | Secure cross-chain atomic swaps |
Citations (20)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US8706914B2 (en) * | 2007-04-23 | 2014-04-22 | David D. Duchesneau | Computing infrastructure |
| US20180329783A1 (en) * | 2016-10-04 | 2018-11-15 | NEC Laboratories Europe GmbH | Method and system for byzantine fault-tolerance replicating of data on a plurality of servers |
| US20180337882A1 (en) * | 2017-05-16 | 2018-11-22 | Peking University Shenzhen Graduate School | Determining consensus in a decentralized domain name system |
| WO2019080235A1 (en) * | 2017-10-26 | 2019-05-02 | 平安科技(深圳)有限公司 | Ethereum-based blockchain system and transaction data processing method |
| US20190147438A1 (en) | 2016-05-04 | 2019-05-16 | Silvio Micali | Distributed transaction propagation and verification system |
| KR20190054738A (en) | 2017-11-14 | 2019-05-22 | 주식회사 아이콘루프 | Method for generating block chain capable of overcoming byzantine fault |
| US20190251007A1 (en) * | 2018-02-12 | 2019-08-15 | Ripple Labs Inc. | Byzantine agreement in open networks |
| US20190327084A1 (en) | 2018-04-19 | 2019-10-24 | Electronics And Telecommunications Research Institute | Method for selecting consensus node using nonce and method and apparatus for generating blockchain using the same |
| US20190354518A1 (en) * | 2018-05-01 | 2019-11-21 | Michael Zochowski | Chain mesh network for decentralized transaction systems |
| US20190379538A1 (en) | 2018-06-12 | 2019-12-12 | Electronics And Telecommunications Research Institute | Method and apparatus for selecting distributed consensus node based on proof of nonce |
| US20200059369A1 (en) * | 2017-05-16 | 2020-02-20 | Peking University Shenzhen Graduate School | Determining consensus by parallel proof of voting in consortium blockchain |
| US20200162264A1 (en) * | 2017-05-22 | 2020-05-21 | Visa International Service Association | Network for improved verification speed with tamper resistant data |
| KR20200074912A (en) | 2018-12-13 | 2020-06-25 | 알리바바 그룹 홀딩 리미티드 | Change of primary node in distributed system |
| WO2020133326A1 (en) * | 2018-12-29 | 2020-07-02 | 北京建极练科技有限公司 | Blockchain generation method and system, and computer storage medium and electronic device |
| KR20200083145A (en) | 2018-12-28 | 2020-07-08 | 연세대학교 산학협력단 | Fault tolerance consensus method for eliminating interference factors in blockchain networks |
| US20200396081A1 (en) * | 2019-06-11 | 2020-12-17 | Celo Labs Inc. | Tree structure for byzantine fault tolerance |
| US20200403776A1 (en) * | 2019-06-18 | 2020-12-24 | Electronics And Telecommunications Research Institute | Apparatus and method for achieving distributed consensus based on decentralized byzantine fault tolerance |
| US11967381B2 (en) * | 2021-04-01 | 2024-04-23 | SK Hynix Inc. | Semiconductor memory device |
| US20240146419A1 (en) * | 2022-11-01 | 2024-05-02 | Electronics And Telecommunications Research Institute | Optical transmitter, optical receiver, and operating methods thereof |
| US20240296158A1 (en) * | 2021-11-18 | 2024-09-05 | Panasonic Intellectual Property Corporation Of America | Management method, device, and recording medium |
-
2020
- 2020-07-27 KR KR1020200093344A patent/KR102577432B1/en active Active
- 2020-11-27 US US17/105,761 patent/US12277587B2/en active Active
Patent Citations (20)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US8706914B2 (en) * | 2007-04-23 | 2014-04-22 | David D. Duchesneau | Computing infrastructure |
| US20190147438A1 (en) | 2016-05-04 | 2019-05-16 | Silvio Micali | Distributed transaction propagation and verification system |
| US20180329783A1 (en) * | 2016-10-04 | 2018-11-15 | NEC Laboratories Europe GmbH | Method and system for byzantine fault-tolerance replicating of data on a plurality of servers |
| US20200059369A1 (en) * | 2017-05-16 | 2020-02-20 | Peking University Shenzhen Graduate School | Determining consensus by parallel proof of voting in consortium blockchain |
| US20180337882A1 (en) * | 2017-05-16 | 2018-11-22 | Peking University Shenzhen Graduate School | Determining consensus in a decentralized domain name system |
| US20200162264A1 (en) * | 2017-05-22 | 2020-05-21 | Visa International Service Association | Network for improved verification speed with tamper resistant data |
| WO2019080235A1 (en) * | 2017-10-26 | 2019-05-02 | 平安科技(深圳)有限公司 | Ethereum-based blockchain system and transaction data processing method |
| KR20190054738A (en) | 2017-11-14 | 2019-05-22 | 주식회사 아이콘루프 | Method for generating block chain capable of overcoming byzantine fault |
| US20190251007A1 (en) * | 2018-02-12 | 2019-08-15 | Ripple Labs Inc. | Byzantine agreement in open networks |
| US20190327084A1 (en) | 2018-04-19 | 2019-10-24 | Electronics And Telecommunications Research Institute | Method for selecting consensus node using nonce and method and apparatus for generating blockchain using the same |
| US20190354518A1 (en) * | 2018-05-01 | 2019-11-21 | Michael Zochowski | Chain mesh network for decentralized transaction systems |
| US20190379538A1 (en) | 2018-06-12 | 2019-12-12 | Electronics And Telecommunications Research Institute | Method and apparatus for selecting distributed consensus node based on proof of nonce |
| KR20200074912A (en) | 2018-12-13 | 2020-06-25 | 알리바바 그룹 홀딩 리미티드 | Change of primary node in distributed system |
| KR20200083145A (en) | 2018-12-28 | 2020-07-08 | 연세대학교 산학협력단 | Fault tolerance consensus method for eliminating interference factors in blockchain networks |
| WO2020133326A1 (en) * | 2018-12-29 | 2020-07-02 | 北京建极练科技有限公司 | Blockchain generation method and system, and computer storage medium and electronic device |
| US20200396081A1 (en) * | 2019-06-11 | 2020-12-17 | Celo Labs Inc. | Tree structure for byzantine fault tolerance |
| US20200403776A1 (en) * | 2019-06-18 | 2020-12-24 | Electronics And Telecommunications Research Institute | Apparatus and method for achieving distributed consensus based on decentralized byzantine fault tolerance |
| US11967381B2 (en) * | 2021-04-01 | 2024-04-23 | SK Hynix Inc. | Semiconductor memory device |
| US20240296158A1 (en) * | 2021-11-18 | 2024-09-05 | Panasonic Intellectual Property Corporation Of America | Management method, device, and recording medium |
| US20240146419A1 (en) * | 2022-11-01 | 2024-05-02 | Electronics And Telecommunications Research Institute | Optical transmitter, optical receiver, and operating methods thereof |
Also Published As
| Publication number | Publication date |
|---|---|
| KR20220013846A (en) | 2022-02-04 |
| KR102577432B1 (en) | 2023-09-12 |
| US20220027970A1 (en) | 2022-01-27 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US12277587B2 (en) | Method and apparatus for agreement of block in blockchain network | |
| CN111259078B (en) | Block chain consensus method, apparatus, computer device and storage medium | |
| US8464091B2 (en) | Byzantine fault tolerant dynamic quorum using a trusted platform module | |
| JP2019516171A (en) | Service processing method, device and system | |
| CN111556133B (en) | Block chain consensus method and system, computer storage medium and electronic equipment | |
| KR20060048419A (en) | Efficient Changes to Replica Sets in Malfunctioning Distributed Computing Systems | |
| JPWO2018154713A1 (en) | Information verification system, information verification apparatus, method and program | |
| US11165766B2 (en) | Implementing authentication protocol for merging multiple server nodes with trusted platform modules utilizing provisioned node certificates to support concurrent node add and remove | |
| CN115689751A (en) | Cross-chain transaction method, device, equipment and storage medium | |
| CN113364874B (en) | Node synchronization method and device based on block chain, storage medium and server | |
| CN115033372A (en) | Method and apparatus for processing data | |
| US20080250421A1 (en) | Data Processing System And Method | |
| CN115829731A (en) | A transaction information processing method and device | |
| CN112306962A (en) | File copying method and device in computer cluster system and storage medium | |
| KR102248991B1 (en) | Apparatus, method and program for controlling connection of neighbor node in block-chain network | |
| CN116009940A (en) | Method, device, computer equipment and medium for changing consensus cluster | |
| US10489239B2 (en) | Multiplexing system, multiplexing method, and computer program product | |
| CN111314393B (en) | Data processing method, device and equipment based on block chain | |
| KR101545010B1 (en) | Distributed file system and method for performing for distributed file system | |
| US10542127B2 (en) | Fault tolerant communication in a distributed system | |
| CN115941184B (en) | Encryption module fault handling method, device, electronic equipment, system and chip | |
| US7249203B2 (en) | Programmatic time-gap defect detection apparatus and method | |
| US20240144268A1 (en) | Control method, non-transitory computer-readable storage medium for storing control program, and information processing apparatus | |
| US11500717B2 (en) | Method for detecting data storage system, device and data storage system | |
| CN119030722A (en) | Encryption machine fault processing, method, storage medium and program product |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| FEPP | Fee payment procedure |
Free format text: ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY |
|
| FEPP | Fee payment procedure |
Free format text: ENTITY STATUS SET TO SMALL (ORIGINAL EVENT CODE: SMAL); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY |
|
| AS | Assignment |
Owner name: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE, KOREA, REPUBLIC OF Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:KIM, YOUNG-CHANG;KIM, KI YOUNG;OH, JINTAE;SIGNING DATES FROM 20201207 TO 20201210;REEL/FRAME:054601/0287 |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: ADVISORY ACTION MAILED |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: EX PARTE QUAYLE ACTION MAILED |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO EX PARTE QUAYLE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS |
|
| STCF | Information on status: patent grant |
Free format text: PATENTED CASE |